Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,925,647 papers from all fields of science
Search
Sign In
Create Free Account
Trust boundary
Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Computer science
Privilege (computing)
Superuser
Vulnerability (computing)
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Sabotaging the system boundary: A study of the inter-boundary vulnerability
Pengfei Wang
,
Xu Zhou
,
Kai Lu
Journal of Information Security and Applications
2020
Corpus ID: 219514534
2018
2018
Research on Key Technologies of Trusted Enhancement in Embedded Systems
Xin-lai Dang
,
Fei Wang
,
Jie Qiang
2018
Corpus ID: 69677082
Aiming at the threats faced by embedded systems, using trusted computing technology to solve embedded security equipment problems…
Expand
2016
2016
XENPWN : BREAKING PARAVIRTUALIZED DEVICES BLACK HAT USA 2016
Double Fetches
,
Intel Ept
,
Nested Virtualization
2016
Corpus ID: 4161001
2016
2016
Information Security Technology under Cloud Computing Technology
X. Zhao
2016
Corpus ID: 63149649
With the coming of information era, cloud computing has become a strong pillar for important management, storage, etc. in modern…
Expand
2010
2010
Implementing Trust-to-Trust with Customer Edge Switching
R. Kantola
IEEE 24th International Conference on Advanced…
2010
Corpus ID: 14089913
A Network Address Translator allows hosts in a private address space to communicate with servers in the public Internet. There is…
Expand
Review
2008
Review
2008
Modeling the Trust Boundaries Created by Securable Objects
Matt Miller
Workshop on Offensive Technologies
2008
Corpus ID: 12302221
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to…
Expand
2003
2003
Vulnerabilities in synchronous IPC designs
J. Shapiro
Symposium on Security and Privacy, .
2003
Corpus ID: 638543
Recent advances in interprocess communication (IPC) performance have been exclusively based on thread-migrating IPC designs…
Expand
2002
2002
What it Really Takes to Handle Exceptional Conditions
R. Wirfs-Brock
,
M. Mirshahi
2002
Corpus ID: 60937766
Handling exceptions, errors, and alternative flows are a critical part of defining good use cases and designing good software…
Expand
2000
2000
Differentiated services: architecture, mechanisms and evaluation
2000
Corpus ID: 166817940
The current Internet assumes the b st-effortservice model. In this model, the network allocates bandwidth among all the…
Expand
1980
1980
Public Trust Protection for Stream Flows and Lake Levels
R. W. Johnson
1980
Corpus ID: 169927052
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE